Beats on K8s were able to read sensitive data like credentials from secrets to prevent these credentials or any other sensitive data in plain text in the config files. We need to provide similar experience on agent. For example, users can create secrets on command line and then refer it in yaml files from k8s secrets store.
cloud_id=test-cloud-id
cloud_auth=testusername:test-cloud-id-password
kubectl create secret generic cloud-secret --from-literal=cloud-id=test-cloud-id --from-literal=cloud-auth=testusername:test-cloud-id-password
valueFrom:
secretKeyRef:
name: cloud-secret
key: cloud-id
We need the agent manifest support reading from K8s secrets.
Beats on K8s were able to read sensitive data like credentials from secrets to prevent these credentials or any other sensitive data in plain text in the config files. We need to provide similar experience on agent. For example, users can create secrets on command line and then refer it in yaml files from k8s secrets store.
cloud_id=test-cloud-idcloud_auth=testusername:test-cloud-id-passwordkubectl create secret generic cloud-secret --from-literal=cloud-id=test-cloud-id --from-literal=cloud-auth=testusername:test-cloud-id-passwordWe need the agent manifest support reading from K8s secrets.